


default search action
Alessandro Armando
Person information
- affiliation: University of Genoa, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j47]Enrico Russo
, Gabriele Costa
, Giacomo Longo, Alessandro Armando, Alessio Merlo
:
LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework. IEEE Trans. Dependable Secur. Comput. 20(6): 4899-4912 (2023) - [j46]Giacomo Longo
, Enrico Russo
, Alessandro Armando, Alessio Merlo
:
Attacking (and Defending) the Maritime Radar System. IEEE Trans. Inf. Forensics Secur. 18: 3575-3589 (2023) - [c99]Enrico Russo, Marina Ribaudo, Alessandro Orlich, Giacomo Longo
, Alessandro Armando:
Cyber Range and Cyber Defense Exercises: Gamification Meets University Students. Gamify@SIGSOFT FSE 2023: 29-37 - [c98]Giacomo Longo
, Alessio Merlo, Alessandro Armando, Enrico Russo:
Electronic Attacks as a Cyber False Flag against Maritime Radars Systems. LCN 2023: 1-6 - 2022
- [j45]Gabriele Costa, Enrico Russo, Alessandro Armando:
Automating the Generation of Cyber Range Virtual Scenarios with VSDL. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 61-80 (2022) - [c97]Marco Raimondi, Giacomo Longo
, Alessio Merlo, Alessandro Armando, Enrico Russo:
Training the Maritime Security Operations Centre Teams. CSR 2022: 388-393 - [i9]Enrico Russo, Gabriele Costa, Giacomo Longo, Alessandro Armando, Alessio Merlo:
LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework. CoRR abs/2202.06954 (2022) - [i8]Giacomo Longo
, Enrico Russo, Alessandro Armando, Alessio Merlo:
Attacking (and defending) the Maritime Radar System. CoRR abs/2207.05623 (2022) - 2021
- [j44]Enrico Russo, Luca Verderame, Alessandro Armando, Alessio Merlo:
DIOXIN: runtime security policy enforcement of fog applications. Int. J. Grid Util. Comput. 12(2): 126-138 (2021) - [j43]Luca Demetrio
, Battista Biggio
, Giovanni Lagorio, Fabio Roli
, Alessandro Armando:
Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware. IEEE Trans. Inf. Forensics Secur. 16: 3469-3478 (2021) - [j42]Luca Demetrio
, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli
:
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection. ACM Trans. Priv. Secur. 24(4): 27:1-27:31 (2021) - [c96]Giovanni Lagorio, Marina Ribaudo, Alessandro Armando:
Capture the Flag competitions for Higher Education. ITASEC 2021: 447-460 - [e8]Alessandro Armando, Michele Colajanni:
Proceedings of the Italian Conference on Cybersecurity, ITASEC 2021, All Digital Event, April 7-9, 2021. CEUR Workshop Proceedings 2940, CEUR-WS.org 2021 [contents] - 2020
- [j41]Enrico Russo
, Gabriele Costa
, Alessandro Armando
:
Building next generation Cyber Ranges with CRACK. Comput. Secur. 95: 101837 (2020) - [c95]Andrea Valenza, Gabriele Costa, Alessandro Armando:
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. RAID 2020: 17-29 - [c94]Alessandro Armando, Giorgia Gazzarata, Fatih Turkmen
:
Benchmarking UAQ Solvers. SACMAT 2020: 145-152 - [c93]Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen
:
AQUA: An Efficient Solver for the User Authorization Query Problem. SACMAT 2020: 153-154 - [i7]Gabriele Costa, Enrico Russo, Alessandro Armando:
Automating the Generation of Cyber Range Virtual Scenarios with VSDL. CoRR abs/2001.06681 (2020) - [i6]Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando:
Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations. CoRR abs/2003.13526 (2020) - [i5]Andrea Valenza, Gabriele Costa, Alessandro Armando:
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners. CoRR abs/2006.09769 (2020) - [i4]Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli:
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection. CoRR abs/2008.07125 (2020)
2010 – 2019
- 2019
- [c92]Giuseppina Murino, Alessandro Armando
, Armando Tacchella
:
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures. CyCon 2019: 1-19 - [c91]Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando:
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries. ITASEC 2019 - [c90]Nicolas Dejon
, Davide Caputo
, Luca Verderame
, Alessandro Armando
, Alessio Merlo
:
Automated Security Analysis of IoT Software Updates. WISTP 2019: 223-239 - [i3]Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, Alessandro Armando:
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries. CoRR abs/1901.03583 (2019) - 2018
- [j40]Gabriele Costa
, Alessio Merlo
, Luca Verderame
, Alessandro Armando
:
Automatic security verification of mobile app configurations. Future Gener. Comput. Syst. 80: 519-536 (2018) - [c89]Enrico Russo
, Gabriele Costa, Alessandro Armando
:
Scenario Design and Validation for Next Generation Cyber Ranges. NCA 2018: 1-4 - 2017
- [j39]Giada Sciarretta
, Roberto Carbone
, Silvio Ranise
, Alessandro Armando
:
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements. Comput. Secur. 71: 71-86 (2017) - [j38]Nadia Metoui
, Michele Bezzi, Alessandro Armando
:
Risk-Based Privacy-Aware Access Control for Threat Detection Systems. Trans. Large Scale Data Knowl. Centered Syst. 36: 1-30 (2017) - [c88]Avinash Sudhodanan, Roberto Carbone
, Luca Compagna, Nicolas Dolgin, Alessandro Armando
, Umberto Morelli
:
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries. EuroS&P 2017: 350-365 - [e7]Alessandro Armando, Roberto Baldoni, Riccardo Focardi:
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017. CEUR Workshop Proceedings 1816, CEUR-WS.org 2017 [contents] - 2016
- [j37]Alessio Merlo
, Gabriele Costa
, Luca Verderame
, Alessandro Armando
:
Android vs. SEAndroid: An empirical assessment. Pervasive Mob. Comput. 30: 113-131 (2016) - [j36]Alessandro Armando
, Roberto Carbone
, Luca Compagna:
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs. Int. J. Softw. Tools Technol. Transf. 18(2): 187-204 (2016) - [c87]Alessandro Armando
, Silvio Ranise
, Riccardo Traverso, Konrad S. Wrona
:
SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies. ABAC@CODASPY 2016: 35-46 - [c86]Nadia Metoui
, Michele Bezzi, Alessandro Armando
:
Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems. FDSE 2016: 285-304 - [c85]Alessandro Armando
, Gabriele Costa
, Alessio Merlo, Luca Verderame
, Konrad S. Wrona
:
Developing a NATO BYOD security policy. ICMCIS 2016: 1-6 - [c84]Konrad S. Wrona
, Sander Oudkerk, Alessandro Armando
, Silvio Ranise
, Riccardo Traverso, Lisa Ferrari, Richard McEvoy:
Assisted content-based labelling and classification of documents. ICMCIS 2016: 1-7 - [c83]Avinash Sudhodanan, Alessandro Armando, Roberto Carbone, Luca Compagna:
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications. NDSS 2016 - [c82]Giada Sciarretta, Alessandro Armando, Roberto Carbone, Silvio Ranise:
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution. SECRYPT 2016: 147-158 - 2015
- [j35]Alessandro Armando
, Gabriele Costa
, Alessio Merlo, Luca Verderame
:
Formal modeling and automatic enforcement of Bring Your Own Device policies. Int. J. Inf. Sec. 14(2): 123-140 (2015) - [j34]Alessandro Armando, Michele Bezzi, Nadia Metoui
, Antonino Sabetta:
Risk-Based Privacy-Aware Information Disclosure. Int. J. Secur. Softw. Eng. 6(2): 70-89 (2015) - [c81]Alessandro Armando
, Gianluca Bocci, Gabriele Costa
, Rocco Mammoliti, Alessio Merlo, Silvio Ranise
, Riccardo Traverso, Andrea Valenza
:
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. MIST@CCS 2015: 41-49 - [c80]Alessandro Armando
, Silvio Ranise
, Riccardo Traverso, Konrad S. Wrona
:
Compiling NATO authorization policies for enforcement in the cloud and SDNs. CNS 2015: 741-742 - [c79]Alessandro Armando
, Roberto Carbone
, Gabriele Costa
, Alessio Merlo:
Android Permissions Unleashed. CSF 2015: 320-333 - [c78]Alessio Coletta
, Alessandro Armando
:
Security Monitoring for Industrial Control Systems. CyberICS/WOS-CPS@ESORICS 2015: 48-62 - [c77]Alessandro Armando
, Alessio Merlo, Luca Verderame
:
Trusted host-based card emulation. HPCS 2015: 221-228 - [c76]Alessandro Armando
, Michele Bezzi, Francesco Di Cerbo, Nadia Metoui
:
Balancing Trust and Risk in Access Control. OTM Conferences 2015: 660-676 - [c75]Alessandro Armando
, Silvio Ranise
, Riccardo Traverso, Konrad S. Wrona
:
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies. SACMAT 2015: 151-155 - [c74]Alessandro Armando
, Gianluca Bocci, Giantonio Chiarelli, Gabriele Costa
, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform. TACAS 2015: 225-230 - 2014
- [j33]Alessandro Armando
, Massimo Benerecetti
, Jacopo Mantovani:
Counterexample-guided abstraction refinement for linear programs with arrays. Autom. Softw. Eng. 21(2): 225-285 (2014) - [j32]Alessandro Armando
, Serena Elisa Ponta:
Model checking authorization requirements in business processes. Comput. Secur. 40: 1-22 (2014) - [j31]Alessandro Armando
, Gabriele Costa
, Luca Verderame
, Alessio Merlo:
Securing the "Bring Your Own Device" Paradigm. Computer 47(6): 48-56 (2014) - [j30]Alessandro Armando
, Alessio Merlo, Luca Verderame
:
Security considerations related to the use of mobile devices in the operation of critical infrastructures. Int. J. Crit. Infrastructure Prot. 7(4): 247-256 (2014) - [j29]Alessandro Armando, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
Mobile App Security Analysis with the MAVeriC Static Analysis Module. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 103-119 (2014) - [c73]Alessandro Armando
, Michele Bezzi, Nadia Metoui
, Antonino Sabetta:
Risk-Aware Information Disclosure. DPM/SETOP/QASA 2014: 266-276 - [c72]Alessandro Armando
, Roberto Carbone
, Eyasu Getahun Chekole
, Silvio Ranise
:
Attribute based access control for APIs in spring security. SACMAT 2014: 85-88 - [c71]Silvio Ranise
, Anh Tuan Truong, Alessandro Armando
:
Scalable and precise automated analysis of administrative temporal role-based access control. SACMAT 2014: 103-114 - [c70]Alessandro Armando
, Roberto Carbone
, Eyasu Getahun Chekole
, Claudio Petrazzuolo, Andrea Ranalli, Silvio Ranise
:
Selective Release of Smart Metering Data in Multi-domain Smart Grids. SmartGridSec 2014: 48-62 - [c69]Alessandro Armando
, Roberto Carbone
, Luca Compagna:
SATMC: A SAT-Based Model Checker for Security-Critical Systems. TACAS 2014: 31-45 - [c68]Alessandro Armando
, Gabriele Costa
, Alessio Merlo, Luca Verderame
:
Enabling BYOD through secure meta-market. WISEC 2014: 219-230 - 2013
- [j28]Alessandro Armando
, Roberto Carbone
, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino, Alessandro Sorniotti:
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations. Comput. Secur. 33: 41-58 (2013) - [j27]Alessandro Armando
, Alessio Merlo, Mauro Migliardi
, Luca Verderame
:
Breaking and fixing the Android Launching Flow. Comput. Secur. 39: 104-115 (2013) - [c67]Alessandro Armando, Enrico Giunchiglia, Marco Maratea, Serena Elisa Ponta:
Modeling and Reasoning about Business Processes under Authorization Constraints: A Planning-Based Approach. ICAPS 2013 - [c66]Alessandro Armando
, Sander Oudkerk, Silvio Ranise
, Konrad S. Wrona
:
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations. FPS 2013: 227-244 - [c65]Alessandro Armando
, Aniello Castiglione
, Gabriele Costa
, Ugo Fiore
, Alessio Merlo, Luca Verderame
, Ilsun You:
Trustworthy Opportunistic Access to the Internet of Services. ICT-EurAsia 2013: 469-478 - [c64]Alessandro Armando
, Roberto Carbone
, Luca Zanetti:
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols. NSS 2013: 728-734 - [c63]Alessandro Armando
, Gabriele Costa
, Alessio Merlo:
Bring your own device, securely. SAC 2013: 1852-1858 - [c62]Alessandro Armando
, Matteo Grasso, Sander Oudkerk, Silvio Ranise
, Konrad S. Wrona
:
Content-based information protection and release in NATO operations. SACMAT 2013: 261-264 - [c61]Alessandro Armando, Alessio Merlo, Luca Verderame:
An Empirical Evaluation of the Android Security Framework. SEC 2013: 176-189 - 2012
- [j26]Alessandro Armando
, Gavin Lowe:
Preface. J. Comput. Secur. 20(1): 1 (2012) - [j25]Alessandro Armando
, Silvio Ranise
:
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving. J. Comput. Secur. 20(4): 309-352 (2012) - [j24]Alessandro Armando
, Enrico Giunchiglia
, Marco Maratea, Serena Elisa Ponta:
An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints. J. Comput. Syst. Sci. 78(1): 119-141 (2012) - [j23]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Securing the "Bring Your Own Device" Policy. J. Internet Serv. Inf. Secur. 2(3/4): 3-17 (2012) - [c60]Alessandro Armando, Silvio Ranise, Fatih Turkmen
, Bruno Crispo:
Efficient run-time solving of RBAC user authorization queries: pushing the envelope. CODASPY 2012: 241-248 - [c59]Alessandro Armando
, Silvio Ranise
:
Automated and Efficient Analysis of Role-Based Access Control with Attributes. DBSec 2012: 25-40 - [c58]Silvio Ranise
, Alessandro Armando
:
On the Automated Analysis of Safety in Usage Control: A New Decidability Result. NSS 2012: 15-28 - [c57]Alessandro Armando
, Alessio Merlo, Mauro Migliardi
, Luca Verderame
:
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures). SEC 2012: 13-24 - [c56]Alessandro Armando
, Roberto Carbone
, Alessio Merlo:
Formal Analysis of a Privacy-Preserving Billing Protocol. SmartGridSec 2012: 108-119 - [c55]Silvio Ranise
, Anh Tuan Truong, Alessandro Armando
:
Boosting Model Checking to Analyse Large ARBAC Policies. STM 2012: 273-288 - [c54]Alessandro Armando
, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone
, Yannick Chevalier
, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea
, Sebastian Mödersheim
, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti
, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - [c53]Alessandro Armando
, Giancarlo Pellegrino, Roberto Carbone
, Alessio Merlo, Davide Balzarotti:
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap. TAP@TOOLS 2012: 3-18 - [c52]Alessandro Armando
, Gabriele Costa
, Alessio Merlo:
Formal Modeling and Reasoning about the Android Security Framework. TGC 2012: 64-81 - [i2]Alessandro Armando, Alessio Merlo, Luca Verderame:
Security Issues in the Android Cross-Layer Architecture. CoRR abs/1209.0687 (2012) - 2011
- [c51]Francesco Alberti, Alessandro Armando
, Silvio Ranise
:
ASASP: Automated Symbolic Analysis of Security Policies. CADE 2011: 26-33 - [c50]Francesco Alberti, Alessandro Armando
, Silvio Ranise
:
Efficient symbolic automated analysis of administrative attribute-based RBAC-policies. AsiaCCS 2011: 165-175 - [c49]Alessandro Armando
, Roberto Carbone
, Luca Compagna, Jorge Cuéllar, Giancarlo Pellegrino, Alessandro Sorniotti:
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? SEC 2011: 68-79 - [c48]Alessandro Armando
, Roberto Carbone
, Silvio Ranise
:
Automated Analysis of Semantic-Aware Access Control Policies: A Logic-Based Approach. ICSC 2011: 356-363 - [c47]Alessandro Armando
, Silvio Ranise
:
Automated Analysis of Infinite State Workflows with Access Control Policies. STM 2011: 157-174 - [e6]Alessandro Armando
, Gavin Lowe:
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6186, Springer 2011, ISBN 978-3-642-16073-8 [contents] - 2010
- [j22]Alessandro Armando
, Peter Baumgartner, Gilles Dowek
:
Preface. J. Autom. Reason. 45(2): 89 (2010) - [c46]Alessio Merlo, Alessandro Armando
:
Cooperative access control for the Grid. IAS 2010: 228-233 - [c45]Alessandro Armando
, Roberto Carbone
, Luca Compagna, Keqin Li, Giancarlo Pellegrino:
Model-Checking Driven Security Testing of Web-Based Applications. ICST Workshops 2010: 361-370 - [c44]Alessandro Armando
, Silvio Ranise
:
Automated Symbolic Analysis of ARBAC-Policies. STM 2010: 17-34
2000 – 2009
- 2009
- [j21]Alessandro Armando
, Roberto Carbone
, Luca Compagna:
LTL model checking for security protocols. J. Appl. Non Class. Logics 19(4): 403-429 (2009) - [j20]Alessandro Armando
, Jacopo Mantovani, Lorenzo Platania:
Bounded model checking of software using SMT solvers instead of SAT solvers. Int. J. Softw. Tools Technol. Transf. 11(1): 69-83 (2009) - [j19]Alessandro Armando
, Maria Paola Bonacina
, Silvio Ranise
, Stephan Schulz:
New results on rewrite-based satisfiability procedures. ACM Trans. Comput. Log. 10(1): 4:1-4:51 (2009) - [c43]Alessandro Armando
:
Building SMT-Based Software Model Checkers: An Experience Report. FroCoS 2009: 1-17 - [c42]Alessandro Armando
, Serena Elisa Ponta:
Model Checking of Security-Sensitive Business Processes. Formal Aspects in Security and Trust 2009: 66-80 - [c41]Alessandro Armando
, Enrico Giunchiglia
, Serena Elisa Ponta:
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach. TrustBus 2009: 63-72 - 2008
- [j18]Alessandro Armando
, Luca Compagna:
SAT-based model-checking for security protocols analysis. Int. J. Inf. Sec. 7(1): 3-32 (2008) - [c40]Alessandro Armando:
Model Checking: New Challenges and Opportunities for Automated Reasoning (Invited Talk). PAAR/ESHOL 2008 - [c39]Alessandro Armando
, Roberto Carbone
, Luca Compagna, Jorge Cuéllar, Llanos Tobarra
:
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. FMSE 2008: 1-10 - [e5]Alessandro Armando, Peter Baumgartner, Gilles Dowek:
Automated Reasoning, 4th International Joint Conference, IJCAR 2008, Sydney, Australia, August 12-15, 2008, Proceedings. Lecture Notes in Computer Science 5195, Springer 2008, ISBN 978-3-540-71069-1 [contents] - 2007
- [c38]Alessandro Armando
, Roberto Carbone
, Luca Compagna:
LTL Model Checking for Security Protocols. CSF 2007: 385-396 - [c37]Alessandro Armando
, Massimo Benerecetti
, Dario Carotenuto, Jacopo Mantovani, Pasquale Spica:
The eureka tool for software model checking. ASE 2007: 541-542 - [c36]Alessandro Armando, Massimo Benerecetti, Jacopo Mantovani:
Abstraction Refinement of Linear Programs with Arrays. TACAS 2007: 373-388 - 2006
- [j17]Alessandro Armando
, Christophe Ringeissen:
Special issue on combining logical systems. Inf. Comput. 204(10): 1411-1412 (2006) - [j16]Alessandro Armando
, David A. Basin, Jorge Cuéllar, Michaël Rusinowitch, Luca Viganò:
Automated Reasoning for Security Protocol Analysis. J. Autom. Reason. 36(1-2): 1-3 (2006) - [c35]Alessandro Armando
, Jacopo Mantovani, Lorenzo Platania:
Bounded Model Checking of Software Using SMT Solvers Instead of SAT Solvers. SPIN 2006: 146-162 - [e4]Alessandro Armando, Alessandro Cimatti:
Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning, PDPAR@CAV 2005, Edinburgh, UK, July 12, 2005. Electronic Notes in Theoretical Computer Science 144(2), Elsevier 2006 [contents] - [i1]Alessandro Armando, Maria Paola Bonacina, Silvio Ranise, Stephan Schulz:
New results on rewrite-based satisfiability procedures. CoRR abs/cs/0604054 (2006) - 2005
- [j15]Alessandro Armando
, Claudio Castellini
, Enrico Giunchiglia
, Marco Maratea:
The SAT-based Approach to Separation Logic. J. Autom. Reason. 35(1-3): 237-263 (2005) - [j14]Alessandro Armando
, Clemens Ballarin:
A reconstruction and extension of Maple's assume facility via constraint contextual rewriting. J. Symb. Comput. 39(5): 503-521 (2005) - [c34]Alessandro Armando, Luca Compagna, Silvio Ranise:
Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation. Mechanizing Mathematical Reasoning 2005: 30-45 - [c33]Alessandro Armando, Claudio Castellini
, Enrico Giunchiglia
, Fausto Giunchiglia, Armando Tacchella
:
SAT-Based Decision Procedures for Automated Reasoning: A Unifying Perspective. Mechanizing Mathematical Reasoning 2005: 46-58 - [c32]Alessandro Armando, David A. Basin
, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko
, Jacopo Mantovani, Sebastian Mödersheim
, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - [c31]